Blog

Fresh insights and the latest in cybersecurity.

Cyber deception is the most effective way to identify threat actors in any organization’s network. Read on for insight into how it works to deliver actionable threat intelligence across industries.

Highlights.

  • Categories:

    We welcome our new strategic advisor, Kevin Rogers. Kevin Rogers is the Founder and Managing Partner of Cyber Advisory Partners (CAP) LLC, and he has had a long career in federal and government sectors Read more

    Welcoming Kevin Rogers to CounterCraft’s Advisory Board
  • Categories: ,

    In this post, we focus on ‘Cetus’, a worm that compromises open Docker daemons with two goals: cryptocurrency mining, and to propagate itself. Read on. Read more

    Docker Daemon Worms Are Still Kicking Around
  • Categories:

    Our Vision | Founder Chat

    The founders of CounterCraft talk about the threat actors they are finding and classifying among internet noise using deception machines. Watch the video. Read more

    Our Vision | Founder Chat
  • Categories: ,

    We have described different payloads that we were observing related to the exploitation of CVE-2021-26084. The majority of the incidents were trying to install crypto miners. Read on as we describe a successful exploit that installs a cryptominer (XMRig), and see how quickly a normal server connected in the Internet can be used for mining… Read more

    A Step-by-Step CVE-2021-26084 Compromise
  • Categories: ,

    ActiveLures™ are designed to attract adversaries into the CounterCraft ActiveSense Environments. Read more

    ActiveLures™, Our Proprietary Breadcrumb Technology
  • Categories: , ,

    Looking at how to use real time kernel monitoring for shellcode detection. Alonso Candado discusses the challenges faced when trying to detect shellcode at runtime, usin the examples of hooking syscalls via hypervisor EPT feature and detecting shellcodes from kernel callback. Read more

    Shellcode Detection Using Real-Time Kernel Monitoring

Top resources.

  • Datasheet

    Securing the Cloud with Deception Technology

  • Whitepapers

    The Ultimate Guide to Zero Trust & Deception Technology

  • Webinars

    Start Gathering Your Own Threat Intelligence

  • Case Study

    Red Eléctrica Detects OT System Attacks Before Breach

  • Webinars

    5 Ways to Stop Insider Threats in Government

  • Webinars

    EDR Isn’t Enough: How to Combat Blindsiding, Unhooking, DLL Injection & More

  • Whitepapers

    Tool Up Your Threat Hunting with Deception Technology

  • Whitepapers

    Incorporating Deception into Your XDR Framework

Top videos.

Founder Chat : Cobalt Strike Explained—What it is and How to Detect it
Presenting…The Platform Version 3
Threat Deception in a Minute | How to Set Up a Deception Web Server
VirusTotal x CounterCraft Integration